CN114945173A - PLMN signaling forwarding method, electronic equipment and storage medium - Google Patents

PLMN signaling forwarding method, electronic equipment and storage medium Download PDF

Info

Publication number
CN114945173A
CN114945173A CN202210323794.XA CN202210323794A CN114945173A CN 114945173 A CN114945173 A CN 114945173A CN 202210323794 A CN202210323794 A CN 202210323794A CN 114945173 A CN114945173 A CN 114945173A
Authority
CN
China
Prior art keywords
plmn
sepp
information
nrf
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210323794.XA
Other languages
Chinese (zh)
Other versions
CN114945173B (en
Inventor
邱权冠
苏国章
吕东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Aipu Road Network Technology Co Ltd
Original Assignee
Guangzhou Aipu Road Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Aipu Road Network Technology Co Ltd filed Critical Guangzhou Aipu Road Network Technology Co Ltd
Priority to CN202210323794.XA priority Critical patent/CN114945173B/en
Publication of CN114945173A publication Critical patent/CN114945173A/en
Application granted granted Critical
Publication of CN114945173B publication Critical patent/CN114945173B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels

Abstract

The application provides a PLMN signaling forwarding method, an electronic device and a storage medium, wherein the PLMN signaling forwarding method is applied to a first PLMN, the first PLMN comprises NF and SEPP, and the method comprises the following steps: the SEPP establishes a first signaling tunnel with the NF based on the information of the NF, and the SEPP saves the information of the NF; when the first PLMN receives an NF discovery request sent by a second PLMN, the SEPP inquires a target NF which needs to be discovered by the second PLMN based on the information of the NF, and responds to the NF discovery request based on an inquiry result. The NF that need not expose in the PLMN can be avoided exposing under other PLMNs to this application to improve the security.

Description

PLMN signaling forwarding method, electronic equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a PLMN signaling forwarding method, an electronic device, and a storage medium.
Background
In a 5G network, if signaling NF in two PLMNs needs to communicate, signaling forwarding through SEPP is needed.
As shown in fig. 5, fig. 5 is a SEPP signaling forwarding flow based on the TS 3GPP standard in the prior art, in the flow, each time NF _1 in PLMN _1 needs to send data across PLMNs to NF _2 in PLMN _2, it needs to discover an NF _2 network element first, and then discover a corresponding SEPP _1, and then can send a service request message requesting NF _2 to SEPP _1, such a message flow is relatively bulky and inefficient. And NRF _1 can discover almost any NF registered to PLMN _2 on NRF _2, so that the NFs in the PLMN are in danger of being exposed to other PLMNs.
Disclosure of Invention
An object of the present invention is to provide a PLMN signaling forwarding method, an electronic device, and a storage medium, so as to at least solve the problem that an NF that does not need to be exposed in a PLMN is exposed in other PLMNs, thereby improving security.
To this end, a first aspect of the present application discloses a cross-PLMN signaling forwarding method, which is applied to a first PLMN, where the first PLMN includes NF and SEPP, and the method includes:
the SEPP establishes a first signaling tunnel with the NF based on the information of the NF, and the SEPP saves the information of the NF;
when the first PLMN receives an NF discovery request sent by a second PLMN, the SEPP inquires a target NF which needs to be discovered by the second PLMN based on the information of the NF, and responds to the NF discovery request based on an inquiry result.
In the first aspect of the present application, as an optional implementation manner, the SEPP querying, based on the information of the NF, a target NF that needs to be discovered by the second PLMN, and responding to the NF discovery request based on a query result includes:
and judging whether the target NF exists in the first PLMN or not based on the NF information, if the target NF does not exist in the first PLMN, sending the first response information to the second PLMN by the SEPP, wherein the first response information represents that the target NF does not exist in the first PLMN.
In the first aspect of the present application, as an optional implementation, the method further includes:
if the target NF exists in the first PLMN, judging whether the target NF can be accessed by the second PLMN based on the information of the target NF;
when the target NF can be accessed by the second PLMN, the SEPP sends second response information to the second PLMN, and the second response information carries the information of the target NF, so that the second PLMN initiates an NF service request to the SEPP based on the information of the target NF.
In the first aspect of the present application, as an optional implementation, the method further includes:
when the SEPP receives the NF service request sent by the second PLMN, the SEPP sends the NF service request to the NF based on the first signaling tunnel;
the NF sends third response information aiming at the NF service request to the second PLMN.
In the first aspect of the present application, as an optional implementation manner, the establishing, by the SEPP, a first signaling tunnel with the NF based on the information of the NF, and enabling the SEPP to store the information of the NF includes:
the NF sends a first tunnel establishment request message to the SEPP, wherein the first tunnel establishment request message carries the information of the NF;
and the SEPP verifies the information of the NF, and stores the information of the NF and returns a fourth response message to the NF after the information of the NF is verified, wherein the fourth response message represents that the first signaling tunnel is successfully established.
In the first aspect of the present application, as an optional implementation manner, the first PLMN further includes an NRF, and the method further includes:
the NF sends a first registration request to the NRF, wherein the first registration request carries access configuration information of the NF;
when receiving the first registration request, the NRF determining whether the NF can be accessed by the second PLMN based on the access configuration information;
when the NF can be accessed by the second PLMN and the SEPP is determined to be accessed by the second PLMN based on the information of the SEPP, the NRF sends a fifth response message carrying the information of the SEPP to the NF, so that the NF sends the first tunnel establishment request message to the SEPP based on the information of the SEPP.
In the first aspect of the present application, as an optional implementation manner, the method further includes:
the SEPP sends a second registration request to the NRF, wherein the second registration request carries the information of the SEPP;
and the NRF returns sixth response information to the SEPP based on the information of the SEPP, wherein the sixth response information represents that the SEPP is successfully registered.
In the first aspect of the present application, as an optional implementation, the method further includes:
the NRF establishes a second signaling tunnel with the SEPP;
when the information of the SEPP is modified, the SEPP sends the modified information of the SEPP to the NPF based on the heartbeat flow in the second signaling tunnel;
the NRF updates local SEPP information based on the modified SEPP information.
In the first aspect of the present application, as an optional implementation manner, the method includes:
when the NF exits the first PLMN or is configured not to be accessed by the second PLMN, the NF sends a signaling tunnel release request message to the SEPP;
and the SEPP releases the first signaling tunnel and clears the information of the NF based on the signaling tunnel release request message.
In the first aspect of the present application, as an optional implementation, the method includes:
when the information of the NF is modified, the NF sends the modified information of the NF to the SEPP;
and the SEPP updates the information of the local NF according to the modified information of the NF.
A second aspect of the present application discloses an electronic device, comprising:
a memory storing executable program code;
a processor coupled with the memory;
the processor invokes the executable program code stored in the memory to perform the PLMN signaling forwarding method of the first aspect of the present application.
A fourth aspect of the present application discloses a storage medium, where the storage medium stores a computer instruction, and the computer instruction is used to execute the PLMN signaling forwarding method according to the first aspect of the present application when being invoked.
Compared with the prior art, the method has the following beneficial technical effects:
by establishing a signaling tunnel between the SEPP and the NF, that is, the SEPP establishes a first signaling tunnel with the NF based on the information of the NF, the SEPP can store the information of the NF, so that, when the first PLMN receives an NF discovery request sent by the second PLMN, the SEPP in the first PLMN can query a target NF, which needs to be discovered by the second PLMN, based on the information of the NF, and reply the NF discovery request based on the query result, compared with the prior art, the embodiment of the present application does not discover the request through the corresponding NF of the NRF in the first PLMN, and further does not need to search the target NF through the NRF in the first PLMN, so that the second PLMN can be prevented from discovering the NF that does not need to be exposed through the NRF in the first PLMN, and further shielding the NRF of an external PLMN (second PLMN) from directly accessing the NRF to cause information leakage of the NF inside the first PLMN, wherein, in the NRF searching process in the prior art, a plurality of NFs in the network can be searched, however, even though the NFs that cannot be accessed by the second PLMN may exist in the NFs, the second PLMN may send the NFs that cannot be accessed by the second PLMN according to the search result that can pass the NRF, so that the NFs are exposed to the second PLMN, and the security problem of the NFs is further caused.
On the other hand, the target NF needing to be found by the second PLMN is inquired through the SEPP, the NF finding request is responded based on the inquiry result, the NRF can be replaced to search the target NF, the NRF inquiry process is further reduced, and the communication efficiency of the first PLMN and the second PLMN is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a flowchart illustrating a cross-PLMN signaling forwarding method disclosed in an embodiment of the present application;
fig. 2 is a flowchart illustrating a cross-PLMN signaling forwarding method disclosed in an embodiment of the present application;
fig. 3 is a schematic diagram illustrating a signaling tunnel information management flow according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 5 is a schematic diagram of a SEPP signaling forwarding process in the prior art.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
Example one
Referring to fig. 1, fig. 1 is a flowchart illustrating a cross-PLMN signaling forwarding method according to an embodiment of the present application, where the method according to the embodiment of the present application is applied to a first PLMN, and the first PLMN includes NF and SEPP. As shown in fig. 1, the method of the embodiment of the present application includes the following steps:
101. the SEPP establishes a first signaling tunnel with the NF based on the information of the NF, and the SEPP stores the information of the NF;
102. when the first PLMN receives an NF discovery request sent by the second PLMN, the SEPP inquires a target NF which needs to be discovered by the second PLMN based on the information of the NF, and responds to the NF discovery request based on the inquiry result.
In the above embodiment, the NF (Network Function) is a Network element of the core Network in the 5G Network, and the NRF (Network Repository Function) is a Network Function discovery service provided by other Network elements in the 5G core Network.
In the above embodiments, a PLMN (Public Land Mobile Network), which is a Network established and operated by the government or an operator approved by the government for the purpose of providing a Land Mobile communication service to the Public, is a Public Land Mobile Network.
In the above embodiment, the SEPP (Security Edge Protection Proxy) is a Proxy gateway for securely forwarding signaling when signaling planes NF of different core networks communicate in the 5G network.
In the above embodiment, the first PLMN and the second PLMN are both PLMNs, where the first PLMN may be an external PLMN of the second PLMN, or the second PLMN may be an external PLMN of the first PLMN.
It should be noted that, when the second PLMN is used as the external PLMN of the first PLMN, the flows executed by the NF, NRF, and SEPP of the first PLMN in the present embodiment may be executed by the NF, NRF, and SEPP of the second PLMN, respectively, and on the other hand, the flows executed by the second PLMN in the present embodiment may be executed by the first PLMN in the present embodiment.
In the foregoing embodiment, for step 101, the information of the NF may be an identifier of the NF, for example, when the SEPP receives the NF discovery request, the identifier of the target NF carried by the NF discovery request is compared with the identifier of the NF in the first PLMN, so as to determine whether the target NF exists in the first PLMN.
In the above embodiment, the first PLMN may have information of multiple NFs, for example, when there are 5 NFs registered in the first PLMN, the SEPP in the first PLMN may have information of 5 NFs, and accordingly, when the SEPP in the first PLMN determines whether there is a target NF, the SEPP compares the identifier of the target NF carried in the NF discovery request with the identifiers of the 5 NFs in sequence, thereby determining whether there is a target NF in the first PLMN.
In the foregoing embodiment, referring to fig. 2 for step 102, fig. 2 is a schematic flowchart of another cross-PLMN signaling forwarding method disclosed in the embodiment of the present application. As shown in fig. 2, a specific manner for the second PLMN to send the NF discovery request to the first PLMN is as follows:
when the NF in the second PLMN needs to access the NF in the first PLMN, the NF of the second PLMN sends a NF discovery request to the NRF in the second PLMN, and then the NRF in the second PLMN sends the NF discovery request to the SEPP in the first PLMN to send the NF discovery request.
In the above embodiment, as shown in fig. 2, the second PLMN refers to PLMN _2, the NF in the second PLMN refers to NF _2, the NRF in the second PLMN refers to NRF _2, and the SEPP in the second PLMN refers to SEPP _ 2; the first PLMN is PLMN _1, the NF in the first PLMN is NF _1, the NRF in the first PLMN is NRF _1, and the SEPP in the first PLMN is SEPP _ 1.
In the above embodiment, the target NF refers to an NF that the second PLMN needs to access, for example, when NF _2 in the second PLMN needs to access NF _1 in the first PLMN, NF _1 is the target NF.
In the above embodiment, the SEPP may store the information of the NF by establishing a signaling tunnel between the SEPP and the NF, that is, the SEPP establishes a first signaling tunnel with the NF based on the information of the NF, so that, when the first PLMN receives an NF discovery request sent by the second PLMN, the SEPP in the first PLMN may query a target NF that needs to be discovered by the second PLMN based on the information of the NF, and respond to the NF discovery request based on a query result, which is compared with the prior art, in the embodiment of the present application, the target NF does not need to be searched by an NRF in the first PLMN instead of the corresponding NF discovery request by an NRF in the first PLMN, and thus, the second PLMN may be prevented from discovering an NF that does not need to be exposed by an NRF in the first PLMN, thereby preventing the NRF of an external PLMN (second PLMN) from directly accessing the NRF to cause information leakage of the NF inside the first PLMN, wherein, in the NRF searching process in the prior art, the NFs in the network are searched, the NFs which cannot be accessed by the external PLMN may exist in the NFs, however, even though the NFs which cannot be accessed by the second PLMN may exist in the NFs, the second PLMN sends the NFs which cannot be accessed by the second PLMN according to the search result which can pass the NRF, so that the NFs are exposed to the second PLMN, and the security problem of the NFs is caused.
On the other hand, the target NF needing to be found by the second PLMN is inquired through the SEPP, the NF finding request is responded based on the inquiry result, the NRF can be replaced to search the target NF, the NRF inquiry process is further reduced, and the communication efficiency of the first PLMN and the second PLMN is improved.
In the embodiment of the present application, as an optional implementation manner, step 102: the SEPP queries target NF needing to be discovered by the second PLMN based on the information of the NF and responds to the NF discovery request based on the query result, and the SEPP comprises the following substeps:
and judging whether the target NF exists in the first PLMN based on the NF information, if the target NF does not exist in the first PLMN, sending first response information to the second PLMN by the SEPP, wherein the first response information represents that the target NF does not exist in the first PLMN.
In this embodiment, as an optional implementation manner, the method in this embodiment further includes the following sub-steps:
if the target NF exists in the first PLMN, judging whether the target NF can be accessed by the second PLMN based on the information of the target NF;
and when the target NF can be accessed by the second PLMN, the SEPP sends second response information to the second PLMN, and the second response information carries the information of the target NF, so that the second PLMN initiates an NF service request to the SEPP based on the information of the target NF.
In this application, as an optional implementation manner, the method of the embodiment of this application further includes the following steps:
when the SEPP receives an NF service request sent by a second PLMN, the SEPP sends the NF service request to the NF based on a first signaling tunnel;
and the NF sends third response information aiming at the NF service request to the second PLMN, wherein the third response information carries service response data, such as communication data.
In the embodiment of the present application, as an optional implementation manner, step 101: the SEPP establishes a first signaling tunnel with the NF based on the information of the NF and enables the SEPP to store the information of the NF, and the SEPP comprises the following substeps:
the NF sends a first tunnel establishment request message to the SEPP, wherein the first tunnel establishment request message carries information of the NF;
and the SEPP verifies the information of the NF, and after the information verification of the NF passes, the information of the NF is stored and a fourth response message is returned to the NF, wherein the fourth response message represents that the first signaling tunnel is successfully established.
In this application, as an optional implementation manner, the first PLMN further includes an NRF, and the method of this embodiment of this application further includes the following steps:
the NF sends a first registration request to the NRF, wherein the first registration request carries access configuration information of the NF;
when receiving the first registration request, the NRF judges whether the NF can be accessed by the second PLMN based on the access configuration information;
when the NF can be accessed by the second PLMN and the SEPP is determined to be accessed by the second PLMN based on the information of the SEPP, the NRF sends a fifth response message carrying the information of the SEPP to the NF, so that the NF sends a first tunnel establishment request message to the SEPP based on the information of the SEPP.
In the above embodiment, the information of the SEPP may be an address of the SEPP, wherein the NF is capable of sending the first setup tunnel request message to the SEPP based on the address of the SEPP.
In the embodiment of the present application, as an optional implementation manner, the method of the embodiment of the present application further includes the following steps:
the SEPP sends a second registration request to the NRF, wherein the second registration request carries the information of the SEPP;
and the NRF returns sixth response information to the SEPP based on the information of the SEPP, wherein the sixth response information represents that the SEPP is successfully registered.
The above alternative embodiment registers the SEPP with the NRF, so that the NRF can tell the NF which SEPP to establish the signaling tunnel based on the SEPP information, and the NRF can determine whether the SEPP and the NF can be accessed by the same external PLMN based on the SEPP information, for example, determine that both the SEPP and the NF can be accessed by the second PLMN based on the SEPP information.
In the above alternative embodiment, the information of the SEPP includes the external PLMN identity supported by the SEPP, and the external PLMN identity supported by the SEPP can be accessed to determine which PLMNs the SEPP supports to access, for example, when the information of the SEPP includes PLMN _3 and PLMN _4, the SEPP may be accessed by a third PLMN network and a fourth PLMN network.
In the above optional embodiment, the information of the SEPP may further include self-loading data of the SEPP, for example, the information of the SEPP includes a current connected device number of the SEPP, where the self-loading data of the SEPP may be used to determine whether the current SEPP can be accessed by the second PLMN, for example, when the loading data of the SEPP shows that the current loading of the SEPP has reached a preset threshold, the SEPP may reject to respond to the communication request of the second PLMN.
In the above optional embodiment, the information of the SEPP further includes network element type information, for example, the information of the SEPP includes a field "SEPP", where, when the NRF in the first PLMN receives the SEPP to send the second registration request, the network element type information in the second registration request is obtained, so as to determine that the second registration request is sent by the SEPP, and thus, the NRF returns sixth response information to the SEPP based on the information of the SEPP.
In the foregoing optional implementation manner, further optionally, after the NRF returns the sixth response information to the SEPP based on the SEPP information, the method of the embodiment of the present application further includes the following steps:
the NRF establishes a second signaling tunnel with SEPP.
Specifically, the NRF establishing the second signaling tunnel with SEPP comprises the following sub-steps:
the NRF sends a second tunnel establishment request message to the SEPP, wherein the second tunnel establishment request message carries NRF information;
when receiving a second tunnel establishment request message sent by the NRF, the SEPP verifies the second tunnel establishment request message, and stores the information of the NRF after the second tunnel establishment request message passes the verification;
the SEPP replies a signaling tunnel establishment success response message to the NRF.
In the above optional embodiment, the information of the NRF includes PLMN, slice, NF identity, and NF type, and on the other hand, in some scenarios, the information of the NRF further includes authentication related parameters, such as a key, which carries the NRF to access the SEPP.
In the above embodiment, since the NRF and the SEPP establish the signaling transmission tunnel, the NRF can directly and quickly transmit data to the SEPP, which further improves the communication efficiency, and on the other hand, encrypts the data in the tunnel, which can further improve the data security.
In the foregoing embodiment, please refer to fig. 3, wherein fig. 3 is a schematic diagram of a signaling tunnel information management flow disclosed in an embodiment of the present application. As shown in fig. 3, the embodiment of the present application further includes the following steps:
when the SEPP information is modified, the SEPP sends the modified SEPP information to the NPF based on the heartbeat flow in the second signaling tunnel;
the NRF updates the local SEPP information based on the modified SEPP information.
The above optional embodiment may update the local SEPP information stored by the NRF in real time dynamically based on the heartbeat flow in the second signaling tunnel when the SEPP information is modified.
In the embodiment of the present application, as an optional implementation manner, the method of the embodiment of the present application includes the following steps:
when the NF exits the first PLMN or is configured to be inaccessible by the second PLMN, the NF sends a signaling tunnel release request message to the SEPP;
the SEPP releases the first signaling tunnel and clears the information of the NF based on the signaling tunnel release request message.
The above alternative embodiment may reduce the SEPP load by releasing the first signaling tunnel and clearing the NF information.
In the embodiment of the present application, as an optional implementation manner, the method of the embodiment of the present application includes:
when the information of the NF is modified, the NF sends the modified information of the NF to the SEPP;
and the SEPP updates the information of the local NF according to the modified information of the NF.
Example two
Referring to fig. 4, fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. As shown in fig. 4, the electronic device of the embodiment of the present application includes:
a memory 201 storing executable program code;
a processor 202 coupled to the memory 201;
the processor 202 calls the executable program code stored in the memory 201 to execute the PLMN signaling forwarding method according to the first embodiment of the present application.
The electronic device of the embodiment of the application can establish a first signaling tunnel with the NF by executing the PLMN signaling forwarding method, and the SEPP stores information of the NF, so that when the first PLMN receives an NF discovery request sent by the second PLMN, the SEPP in the first PLMN can query a target NF, which needs to be discovered by the second PLMN, based on the information of the NF, and respond to the NF discovery request based on a query result, by receiving the NF discovery request sent by the second PLMN, and thus, compared with the prior art, the electronic device of the embodiment of the application does not query the NF discovery request corresponding to the NF in the first PLMN based on the information of the NF, and further does not need to search the target NF by using the NRF in the first PLMN, so that the second PLMN can be prevented from discovering an exposed NF by using the NRF in the first PLMN, and further, the NRF of an external PLMN (second PLMN) is prevented from directly accessing the NRF, and information inside the first PLMN is leaked, wherein, in the NRF search process of the PLMN in the prior art, multiple NFs in the network are searched, and there may be NFs that cannot be accessed by the external PLMN in the multiple NFs, however, even though there may be NFs that cannot be accessed by the second PLMN in the multiple NFs, the second PLMN sends these NFs that cannot be accessed by the second PLMN according to the search result that can pass the NRF, so that these NFs are exposed to the second PLMN, and the security problem of the NFs is further caused.
On the other hand, the target NF needing to be found by the second PLMN is inquired through the SEPP, the NF finding request is responded based on the inquiry result, the NRF can be replaced to search the target NF, the NRF inquiry process is further reduced, and the communication efficiency of the first PLMN and the second PLMN is improved.
EXAMPLE III
The embodiment of the application discloses a storage medium, wherein a computer instruction is stored in the storage medium, and when the computer instruction is called, the storage medium is used for executing the PLMN signaling forwarding method of the embodiment of the application.
Compared with the prior art, the storage medium of the embodiment of the present application can establish a first signaling tunnel with the NF by executing a PLMN signaling forwarding method, by establishing a signaling tunnel between the SEPPs and the NF, that is, the SEPPs establish a first signaling tunnel with the NF based on information of the NF, so that the SEPPs store information of the NF, and thus, when the first PLMN receives an NF discovery request sent by the second PLMN, the SEPPs in the first PLMN can query a target NF that needs to be discovered by the second PLMN based on the information of the NF, and reply the NF discovery request based on the query result, which does not correspond to the NF discovery request through an NRF in the first PLMN, and further does not need to search for the target NF through an NRF in the first PLMN, so that it is possible to avoid the second PLMN discovering an NF that does not need to be exposed through the NRF in the first PLMN, and further preventing the NRF of an external PLMN (second PLMN) from directly accessing the NRF to cause information leakage inside the first PLMN, wherein, in the NRF search process of the PLMN in the prior art, multiple NFs in the network are searched, and there may be NFs that cannot be accessed by the external PLMN in the multiple NFs, however, even though there may be NFs that cannot be accessed by the second PLMN in the multiple NFs, the second PLMN sends these NFs that cannot be accessed by the second PLMN according to the search result that can pass through the NRF, so that these NFs are exposed to the second PLMN, and further the security problem of the NFs is caused.
On the other hand, the target NF needing to be found by the second PLMN is inquired through the SEPP, the NF finding request is responded based on the inquiry result, the NRF can be replaced to search the target NF, the NRF inquiry process is further reduced, and the communication efficiency of the first PLMN and the second PLMN is improved.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
In addition, units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Furthermore, the functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
It should be noted that the functions, if implemented in the form of software functional modules and sold or used as independent products, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (12)

1. A cross-PLMN signaling forwarding method, applied to a first PLMN, the first PLMN comprising NF and SEPP, the method comprising:
the SEPP establishes a first signaling tunnel with the NF based on the information of the NF, and the SEPP saves the information of the NF;
when the first PLMN receives an NF discovery request sent by a second PLMN, the SEPP inquires a target NF which needs to be discovered by the second PLMN based on the information of the NF, and responds to the NF discovery request based on an inquiry result.
2. The method of claim 1, wherein the SEPP queries a target NF that needs to be discovered by the second PLMN based on the information of the NF, and replies to the NF discovery request based on a result of the query, comprising:
and judging whether the target NF exists in the first PLMN or not based on the NF information, if the target NF does not exist in the first PLMN, sending first response information to the second PLMN by the SEPP, wherein the first response information represents that the target NF does not exist in the first PLMN.
3. The method of claim 2, wherein the method further comprises:
if the target NF exists in the first PLMN, judging whether the target NF can be accessed by the second PLMN based on the information of the target NF;
when the target NF can be accessed by the second PLMN, the SEPP sends second response information to the second PLMN, and the second response information carries the information of the target NF, so that the second PLMN initiates an NF service request to the SEPP based on the information of the target NF.
4. The method of claim 3, wherein the method further comprises:
when the SEPP receives the NF service request sent by the second PLMN, the SEPP sends the NF service request to the NF based on the first signaling tunnel;
the NF sends third response information aiming at the NF service request to the second PLMN.
5. The method of claim 1, wherein the SEPP establishing a first signaling tunnel with the NF based on the information of the NF, and causing the SEPP to save the information of the NF comprises:
the NF sends a first tunnel establishment request message to the SEPP, wherein the first tunnel establishment request message carries the information of the NF;
and the SEPP verifies the information of the NF, and stores the information of the NF and returns a fourth response message to the NF after the information of the NF is verified, wherein the fourth response message represents that the first signaling tunnel is successfully established.
6. The method of claim 5, wherein the first PLMN further comprises an NRF, and wherein the method further comprises:
the NF sends a first registration request to the NRF, wherein the first registration request carries access configuration information of the NF;
when receiving the first registration request, the NRF determining whether the NF is accessible by the second PLMN based on the access configuration information;
when the NF can be accessed by the second PLMN and the SEPP is determined to be accessed by the second PLMN based on the information of the SEPP, the NRF sends a fifth response message carrying the information of the SEPP to the NF, so that the NF sends the first tunnel establishment request message to the SEPP based on the information of the SEPP.
7. The method of claim 6, wherein the method further comprises:
the SEPP sends a second registration request to the NRF, wherein the second registration request carries the information of the SEPP;
and the NRF returns sixth response information to the SEPP based on the information of the SEPP, wherein the sixth response information represents that the SEPP is successfully registered.
8. The method of claim 7, wherein the method further comprises:
the NRF establishes a second signaling tunnel with the SEPP;
when the information of the SEPP is modified, the SEPP sends the modified information of the SEPP to the NPF based on the heartbeat flow in the second signaling tunnel;
the NRF updates local SEPP information based on the modified SEPP information.
9. The method of claim 8, wherein the method comprises:
when the NF exits the first PLMN or is configured not to be accessed by the second PLMN, the NF sends a signaling tunnel release request message to the SEPP;
and the SEPP releases the first signaling tunnel and clears the information of the NF based on the signaling tunnel release request message.
10. The method of any one of claims 1-9, wherein the method comprises:
when the information of the NF is modified, the NF sends the modified information of the NF to the SEPP;
and the SEPP updates the information of the local NF according to the modified information of the NF.
11. An electronic device, characterized in that the electronic device comprises:
a memory storing executable program code;
a processor coupled with the memory;
the processor invokes the executable program code stored in the memory to perform the PLMN signaling forwarding method of any one of claims 1-10.
12. A storage medium storing computer instructions for performing the PLMN signaling forwarding method of any one of claims 1-10 when invoked.
CN202210323794.XA 2022-03-29 2022-03-29 Cross-PLMN signaling forwarding method, electronic equipment and storage medium Active CN114945173B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210323794.XA CN114945173B (en) 2022-03-29 2022-03-29 Cross-PLMN signaling forwarding method, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210323794.XA CN114945173B (en) 2022-03-29 2022-03-29 Cross-PLMN signaling forwarding method, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114945173A true CN114945173A (en) 2022-08-26
CN114945173B CN114945173B (en) 2023-05-05

Family

ID=82906604

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210323794.XA Active CN114945173B (en) 2022-03-29 2022-03-29 Cross-PLMN signaling forwarding method, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114945173B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109803242A (en) * 2017-11-17 2019-05-24 中兴通讯股份有限公司 Method, equipment and the readable storage medium storing program for executing of NF discovery are carried out by NRF
CN110290161A (en) * 2018-03-19 2019-09-27 中国移动通信有限公司研究院 A kind of topology hiding method, node, functional entity and computer storage medium
US20200036754A1 (en) * 2018-07-30 2020-01-30 Cisco Technology, Inc. Sepp registration, discovery and inter-plmn connectivity policies
CN112367666A (en) * 2020-11-05 2021-02-12 广州爱浦路网络技术有限公司 Method, device and system for allowing pNF in 5G core network to pass NRF authentication cNF
US20210297935A1 (en) * 2020-03-23 2021-09-23 Nokia Technologies Oy Apparatus, method and computer program related to information about scp(s) and sepp(s) stored in nrf
CN113438196A (en) * 2020-03-23 2021-09-24 华为技术有限公司 Service authorization method, device and system
CN113727341A (en) * 2020-05-11 2021-11-30 华为技术有限公司 Secure communication method, related device and system
WO2021249512A1 (en) * 2020-06-12 2021-12-16 华为技术有限公司 Secure communication method, related apparatus, and system
CN113994625A (en) * 2019-04-11 2022-01-28 株式会社Ntt都科摩 Network node

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109803242A (en) * 2017-11-17 2019-05-24 中兴通讯股份有限公司 Method, equipment and the readable storage medium storing program for executing of NF discovery are carried out by NRF
CN110290161A (en) * 2018-03-19 2019-09-27 中国移动通信有限公司研究院 A kind of topology hiding method, node, functional entity and computer storage medium
US20200036754A1 (en) * 2018-07-30 2020-01-30 Cisco Technology, Inc. Sepp registration, discovery and inter-plmn connectivity policies
CN113994625A (en) * 2019-04-11 2022-01-28 株式会社Ntt都科摩 Network node
US20210297935A1 (en) * 2020-03-23 2021-09-23 Nokia Technologies Oy Apparatus, method and computer program related to information about scp(s) and sepp(s) stored in nrf
CN113438196A (en) * 2020-03-23 2021-09-24 华为技术有限公司 Service authorization method, device and system
CN113727341A (en) * 2020-05-11 2021-11-30 华为技术有限公司 Secure communication method, related device and system
WO2021249512A1 (en) * 2020-06-12 2021-12-16 华为技术有限公司 Secure communication method, related apparatus, and system
CN112367666A (en) * 2020-11-05 2021-02-12 广州爱浦路网络技术有限公司 Method, device and system for allowing pNF in 5G core network to pass NRF authentication cNF

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HUAWEI: "C4-185052 \"Discussion on TLS and Inter PLMN Routing through SEPP\"" *

Also Published As

Publication number Publication date
CN114945173B (en) 2023-05-05

Similar Documents

Publication Publication Date Title
CN111314459B (en) Service request method, device, electronic equipment and storage medium
CN115442423A (en) Method for discovering services provided by a network repository function
US8931065B2 (en) OTA bootstrap method and system
CN116057924A (en) Methods, systems, and computer readable media for providing network function discovery service enhancements
CN105430711B (en) Transmission method, device and the equipment of information
CN111132305B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN108881520B (en) IPv6 address allocation method, SMF and communication system
CN114158030B (en) Session binding method, system and storage medium
CN100479570C (en) Connection set-up method, system, network application entity and user terminal
US20230283470A1 (en) Service Request Handling
CN114221959A (en) Service sharing method, device and system
CN110740464A (en) NF service discovery method and device
CN112788518A (en) Location service processing method and related equipment
CN109548411B (en) Method and device for controlling controllable equipment to access network
CN110348205B (en) API topology hiding method, device and system
CN114945173A (en) PLMN signaling forwarding method, electronic equipment and storage medium
CN114006939A (en) Message pushing method and device
CN111163466A (en) Method for 5G user terminal to access block chain, user terminal equipment and medium
CN113596890B (en) Communication method, system, device and storage medium
CN113422772B (en) Private network terminal access processing method and device and electronic equipment
CN114301778B (en) Access control method and device
CN111432378B (en) Service information management platform and method
WO2023040611A1 (en) Communication method and related apparatus
CN115209522A (en) Network function registration method, discovery method, device, equipment and medium
US20180205795A1 (en) Method and Apparatus for Processing Device Triggering Information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant